×

System and method for detecting malicious activity and classifying a network communication based on different indicator types

  • US 10,033,753 B1
  • Filed: 04/24/2017
  • Issued: 07/24/2018
  • Est. Priority Date: 05/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method for detecting communications associated with a cyber-attack, comprising:

  • parsing packets of a network communication to identify at least network addressing information within the packets;

    performing a first analysis on the network addressing information to determine whether the network addressing information corresponds to one or more high quality indicators, each high quality indicator of the one or more high quality indicators (i) identifies a strong correlation with a malicious activity and (ii) is represented by a first value being a score generated for the high quality indicator for use in classifying the network communication;

    performing a second analysis on content of the network communication other than the network addressing information to determine whether the analyzed content of the network communication corresponds to one or more supplemental indicators, each supplemental indicator of the one or more supplemental indicators (i) identifies an anomaly in the content of the network communication and (ii) is represented by a second value being a score generated for the supplemental indicator for use in classifying the network communication; and

    classifying the network communication as part of the cyber-attack by (i) classifying the network communication as being part of the cyber-attack when one or more values of the one or more high quality indicators exceeds a predetermined threshold without consideration of the one or more supplemental indicators, and (ii) in response to the one or more first values corresponding to the one or more high quality indicators failing to exceed the predetermined threshold, using the one or more second values representing the one or more supplemental indicators with at least the one or more first values to classify the communication as being part of the cyber-attack.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×